Static task
static1
Behavioral task
behavioral1
Sample
58d1b1fb9c47419be917eda4e06c31c01a8e799e1d3d8991b18d22bbd0964c14.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
58d1b1fb9c47419be917eda4e06c31c01a8e799e1d3d8991b18d22bbd0964c14.exe
Resource
win10v2004-20220812-en
General
-
Target
58d1b1fb9c47419be917eda4e06c31c01a8e799e1d3d8991b18d22bbd0964c14
-
Size
1.1MB
-
MD5
9a4bcf6ac9fd77186b20a16537f287d4
-
SHA1
ce8ff3b09e98cad5c8d9afb87d462f96eb850336
-
SHA256
58d1b1fb9c47419be917eda4e06c31c01a8e799e1d3d8991b18d22bbd0964c14
-
SHA512
d548144a4ae7d0aa9cd101b82971a2af72d7c4a24b833308e87918d054cbb17976fed437dccddcb844f0e8c4b1669efd66f86e393c194899b4365adea7b35556
-
SSDEEP
6144:kdySxmtLQdnqDoyGyU+VXJVFess+YUHd+kG7UOfEvSI4WnW8SSsAYj8wUIzoM40X:kBhKACIUf6VS7UE1tIUx2r+bUiT+P
Malware Config
Signatures
Files
-
58d1b1fb9c47419be917eda4e06c31c01a8e799e1d3d8991b18d22bbd0964c14.exe windows x86
f274f20bb88dfe0af3af8e453b7a51e7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetUnhandledExceptionFilter
SizeofResource
Sleep
TerminateProcess
UnhandledExceptionFilter
VirtualFree
WaitForMultipleObjects
WaitForSingleObject
SetLastError
WriteFile
lstrcatW
lstrcmpiW
lstrcpyW
lstrcpynW
lstrlenA
lstrlenW
SetHandleInformation
SetFilePointer
SetErrorMode
ReleaseMutex
QueryPerformanceCounter
PostQueuedCompletionStatus
MultiByteToWideChar
LocalFree
LocalAlloc
LoadResource
LoadLibraryExW
InterlockedIncrement
InterlockedExchange
InterlockedDecrement
InitializeCriticalSection
HeapFree
HeapAlloc
GetTickCount
GetSystemTimeAsFileTime
GetSystemDirectoryW
GetSystemDirectoryA
GetStartupInfoW
GetProcessHeap
GetProcAddress
VirtualAlloc
GetOEMCP
GetModuleHandleA
GetModuleFileNameW
GetLocalTime
GetLastError
GetFileSize
GetCurrentProcessId
GetCurrentProcess
GetConsoleCP
GetCommandLineW
GetACP
FreeLibrary
FormatMessageW
FindResourceW
ExpandEnvironmentStringsW
DeleteCriticalSection
CreateNamedPipeW
CreateMutexW
CreateFileW
CreateEventW
CloseHandle
LoadLibraryA
LoadLibraryW
GetDriveTypeA
GetModuleHandleW
WideCharToMultiByte
user32
wsprintfW
wsprintfA
SetProcessWindowStation
OpenWindowStationW
MessageBoxW
LoadStringW
LoadStringA
GetProcessWindowStation
CreateWindowStationW
CreateDesktopW
CloseWindowStation
CloseDesktop
CharNextW
advapi32
CryptGenRandom
RegDeleteValueW
RegDeleteKeyW
RegCreateKeyW
RegCreateKeyExW
RegCloseKey
OpenServiceW
OpenSCManagerW
OpenProcessToken
MakeSelfRelativeSD
LsaQueryInformationPolicy
LsaOpenPolicy
LsaFreeMemory
LsaClose
LookupPrivilegeValueW
InitializeSecurityDescriptor
InitializeAcl
GetTokenInformation
GetSecurityDescriptorLength
GetLengthSid
GetAce
FreeSid
EqualSid
DeregisterEventSource
DeleteService
CryptReleaseContext
CryptAcquireContextW
CreateServiceW
ControlService
CloseServiceHandle
ChangeServiceConfigW
AllocateAndInitializeSid
AdjustTokenPrivileges
AddAccessAllowedAce
RegQueryValueExW
RegOpenKeyExA
RegNotifyChangeKeyValue
RegOpenKeyExW
RegQueryInfoKeyW
RegSetKeySecurity
RegSetValueExW
RegisterEventSourceW
RegisterServiceCtrlHandlerW
ReportEventW
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
SetServiceStatus
StartServiceCtrlDispatcherW
RegEnumKeyExW
ole32
CoUninitialize
CoTaskMemRealloc
CoTaskMemFree
CoTaskMemAlloc
CoRevokeClassObject
CoRegisterClassObject
CoInitializeSecurity
CoInitializeEx
CoInitialize
msvcrt
wcsrchr
wcsncpy
wcsncat
wcslen
wcscpy
wcscmp
wcschr
wcscat
strtoul
strncpy
_XcptFilter
__p__commode
__p__fmode
__set_app_type
__setusermatherr
__wgetmainargs
_adjust_fdiv
_c_exit
_cexit
_controlfp
_except_handler3
_exit
_initterm
_itow
_ltoa
_purecall
_putws
_snprintf
_snwprintf
_vsnwprintf
_wcmdln
_wcsicmp
_wsplitpath
calloc
exit
free
malloc
realloc
sprintf
strchr
Sections
.text Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ